Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

OnSecurity Features

What are the features of OnSecurity?

Administration

  • Reporting and Analytics

Analysis

  • Issue Tracking

Top Rated OnSecurity Alternatives

Filter for Features

Orchestration

Asset Management

Lets users group and organize their endpoints to gather threat intelligence on specific technologies.

Not enough data

Security Workflow Automation

Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.

Not enough data

Deployment

The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.

Not enough data

Sandboxing

A feature that allows security testing and information gathering to occur in a secure, resource independent environment.

Not enough data

Information

Proactive Alerts

Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.

Not enough data

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Intelligence Reports

The ability for users to produce reports outlining detailed and personalized threat information

Not enough data

Personalization

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data

Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

Not enough data

Dynamic/Code Analysis

The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.

Not enough data

Administration

API / Integrations

Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Extensibility

Provides the ability to extend the platform to include additional features and functionalities

Not enough data

Reporting and Analytics

Based on 11 OnSecurity reviews. Tools to visualize and analyze data.
97%
(Based on 11 reviews)

Analysis

Issue Tracking

As reported in 10 OnSecurity reviews. Track issues and manage resolutions.
95%
(Based on 10 reviews)

Reconnaissance

Gathers information about the system and potential exploits to be tested.

Not enough data

Vulnerability Scan

Scans applications and networks for known vulnerabilities, holes and exploits.

Not enough data

Testing

Command-Line Tools

Allows users to access a terminal host system and input command sequences.

Not enough data

Manual Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data

Test Automation

Runs pre-scripted security tests without requiring manual work.

Not enough data

Performance and Reliability

Software is consistently available (uptime) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took.

Not enough data

Performance

Issue Tracking

Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.

Not enough data

Detection Rate

The rate at which scans accurately detect all vulnerabilities associated with the target.

Not enough data

False Positives

The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.

Not enough data

Automated Scans

Runs pre-scripted vulnerability scans without requiring manual work.

Not enough data

Network

Compliance Testing

Allows users to scan applications and networks for specific compliance requirements.

Not enough data

Perimeter Scanning

Analyzes network devices, servers and operating systems for vulnerabilities.

Not enough data

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Not enough data

Application

Manual Application Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data

Static Code Analysis

Scans application source code for security flaws without executing it.

Not enough data

Black Box Testing

Scans functional applications externally for vulnerabilities like SQL injection or XSS.

Not enough data